0 ratings0% found this document useful (0 votes) 84 views2 pagesEtc Pyq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
22ETC151/251
Model Question Paper-I/II with effect from 2022-23 (CBCS Scheme)
USN
First/Second Semester B.E. Degree Examination
Introduction to Cyber Security (22ETC151/251)
TIME: 03 Hours
Max. Marks: 100
Note: Answer any FIVE full questions, choosing at least ONE question from each MODULE.
*Bloom’s
ote aie a
‘eve
Sar [Dat copter Sine Da nt Ck nd Cr as
b
© Ete aos einer Ry aT dion tr 3
| is ane TATA 2 a 3
| 264, [84
oR
OE [| ORR aITT Ta mTONRE. 5 |
|
1 is aC an a4 se
pad Sangam TAS 7> 3] az
‘eae
Sar [= [ar Socal Ergin? Dec nan Bas Sl Eginenng waka] ES
siabiecamnle 6) P62, [163
1 ipa aw Sa a ai Li pass vane PTZ
| ‘cyber crimes £44 50) 64 :
©] aa api yap and FNC gE |]
seperti CG
OR :
QOt Ta | Define Cyber Stalking along with its working, En eo Sas a z
£2
1 ize bean pave aac and The aS naa oie Cae
=| a a Wi, are YY
TE _Modute-3 i = —_]
05] Whar frre ey gga Aa Tey Tagen Lie avanapsso?™ LZ |
wassup a.G
1 Wha roy save WHat pr a
129
PI24
Page 01 of 0222ETC1S1/251
55a fr Backor? Discuss ay Tour examples oF Backdoor Trojans ? 1D, é
= ————
1! oR US. z
BE Ta | Discuss various types of Viruses ‘categorized based on attacks on various 13 8
elements of the system PI4’G
is fishing? How fishing works? >, ~ [ts 6
| What is Fishing’ 7" PBL, Pre
15 [Discuss our ppes of DoS attacks: 12 é
i Module-t
G7 Te [Expinn Tour pes of metiods used by the phishers to revel personal 2 10
information on tnternet 213
—1p | Discuss various types of Phishing Seams v 22 ae To
OR
Ga] J Discuss the various techniques used By Phishers to Taunch Phishing aie ne 10
1 | Discuss various types of Kdentity Thelt techniques. 3 10
6247128
Modules
we ig phases of Forensics life eycles
i fication
ii) Collection and Recording P26
7398
1 [Lis various Computer Forensics services available, explain any two ofthems | C2, 6
Briefly explain RFC2822 = i
riefly explain 4
x P362—
TO ]@ ] Discuss the following phases of Forensics life cycle iz 0
i) Storing and Transporting
ii) Examination/Investigation 2 6 2 896.
| Discuss the need for concept of Computer Forensics Pane i =
© | Briefly explain Network Foren: 0 7 7
“Bloom's Taxonomy Level: Indicate as L1, L2, L3, L4, etc. It is also desirable to indicate the COs and POs to be
‘tained by every bit of questions.
You might also like
Section 1: Introduction To Cybersecurity, CIA, Cyber Threats, Attacks, Vulnerabilities, and Malware
Section 1: Introduction To Cybersecurity, CIA, Cyber Threats, Attacks, Vulnerabilities, and Malware
14 pages